Web Ofisi Emlak V2 contains multiple SQL injection vulnerabilities in the endpoint that allow unauthenticated attackers to manipulate database queries through GET parameters. Attackers can inject SQL code into parameters like emlak_durumu, emlak_tipi, il, ilce, kelime, and semt to extract sensitive database information or perform time-based blind SQL injection attacks.
References
Configurations
History
02 Mar 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
26 Feb 2026, 20:14
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Web-ofisi emlak
Web-ofisi |
|
| CPE | cpe:2.3:a:web-ofisi:emlak:2.0.0:*:*:*:*:*:*:* | |
| References | () https://www.exploit-db.com/exploits/47142 - Exploit | |
| References | () https://www.vulncheck.com/advisories/web-ofisi-emlak-sql-injection-via-emlak-arahtml - Broken Link | |
| References | () https://www.web-ofisi.com/detay/emlak-scripti-v3.html - Product |
23 Feb 2026, 18:13
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
22 Feb 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-22 15:16
Updated : 2026-03-02 15:16
NVD link : CVE-2019-25459
Mitre link : CVE-2019-25459
CVE.ORG link : CVE-2019-25459
JSON object : View
Products Affected
web-ofisi
- emlak
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
